Skip to main content

Command Palette

Search for a command to run...

KubeLB

Updated
5 min read

Overview

KubeLB is a project by Kubermatic, it is a Kubernetes native tool, responsible for centrally managing Layer 4 and 7 load balancing configurations for Kubernetes clusters across multi-cloud and on-premise environments.

Motivation and Background

Kubernetes does not offer any implementation for load balancers and in turn relies on the in-tree or out-of-tree cloud provider implementations to take care of provisioning and managing load balancers. This means that if you are not running on a supported cloud provider, your services of type LoadBalancer will never be allotted a load balancer IP address. This is an obstacle for bare-metal Kubernetes environments.

There are solutions available like MetalLB, Cilium, etc. that solve this issue. However, these solutions are focused on a single cluster where you have to deploy the application in the same cluster where you want the load balancers. This is not ideal for multi-cluster environments since you have to configure load balancing for each cluster separately, which makes IP address management not trivial.

For application load balancing, we have the same case where an external application like nginx-ingress, envoy gateway, needs to be deployed in the cluster. To further secure traffic, additional tools are required for managing DNS, TLS certificates, Web Application Firewall, etc.

KubeLB solves this problem by providing a centralized management solution that can manage the data plane for multiple Kubernetes clusters across multi-cloud and on-premise environments. This enables you to manage fleet of Kubernetes clusters in a centralized way, ensuring security compliance, enforcing policies, and providing a consistent experience for developers.

Architecture

KubeLB follows the hub and spoke model in which the "Management Cluster" acts as the hub and the "Tenant Clusters" act as the spokes. The information flow is from the tenant clusters to the management cluster. The agent running in the tenant cluster watches for nodes, services, ingresses, and Gateway API etc. resources and then propagates the configuration to the management cluster. The management cluster then deploys the load balancer and configures it according to the desired specification. Management cluster then uses Envoy Proxy to route traffic to the appropriate endpoints i.e. the node ports open on the nodes of the tenant cluster.

For security and isolation, the tenants have no access to any native kubernetes resources in the management cluster. The tenants can only interact with the management cluster via the KubeLB CRDs. This ensures that they are not exceeding their access level and only perform controlled operations in the management cluster.

KubeLB Architecture

Documentation

For detailed documentation KubeLB Docs.

Installation

Manager

Please refer to the KubeLB Manager README for installation instructions.

CCM

Please refer to the KubeLB CCM README for installation instructions.

Troubleshooting

If you encounter issues file an issue or talk to us on the #kubermatic channel on the Kubermatic Slack.

Contributing

Thanks for taking the time to join our community and start contributing!

Feedback and discussion are available on the mailing list.

Before you start

  • Please familiarize yourself with the Code of Conduct before contributing.

  • See CONTRIBUTING.md for instructions on the developer certificate of origin that we require.

Pull requests

  • We welcome pull requests. Feel free to dig through the issues and jump in.

Changelog

See the list of releases to find out about feature changes.

.githubchore - update dependencieslast year
.prowFix CI job to publish helm chart (#52)last week
api/kubelb.k8c.io/v1alpha1Fix status propagation and global topology (#54)last week
chartsUse enable-gateway-api instead of disable-gateway-api (#59)4 days ago
cmdFix flag parsing (#60)4 days ago
configFix status propagation and global topology (#54)last week
docsUpdate readme (#57)4 days ago
hackUpdate readme (#57)4 days ago
internalDisable Gateway API watches if gateway is disabled (#58)4 days ago
.dockerignoreLayer 7 load balancing support for Ingress (#22)last month
.gimps.yamlUpdate linter and add gimps (#54)last year
.gitignoreUpgrade to Go 1.22.6 & RBAC fixes (#48)2 weeks ago
.golangci.ymlTenant and Global configurations (#41)2 weeks ago
.typos.tomlAdd typos config (#29)last month
.wwhrd.ymlMinor fixes and improvements (#37)3 weeks ago
.yamllint.confAdd helm charts for kubelb (#80)10 months ago
CHANGELOG.mdUpdates (#49)last week
CODE_OF_CONDUCT.mdadd open source requirements4 years ago
CONTRIBUTING.mdadd open source requirements4 years ago
DCOPrepare for v1.0.0 release (#1)5 months ago
LICENSEadd open source requirements4 years ago
MakefileFix CI job to publish helm chart (#52)last week
NOTICEadd open source requirements4 years ago
OWNERSUpdate OWNERSlast year
OWNERS_ALIASESSynchronize OWNERS_ALIASES file with Github teams (#15)3 months ago
PROJECTSupport for synchronizing secrets from tenant to LB cluster (#42)2 weeks ago
README.mdUpdate readme (#57)4 days ago
ccm.dockerfileKubeLB is now built with Go 1.23 (#51)last week
go.modUpgrade to Go 1.22.6 & RBAC fixes (#48)2 weeks ago
go.sumUpgrade to Go 1.22.6 & RBAC fixes (#48)2 weeks ago
kubelb.dockerfileKubeLB is now built with Go 1.23 (#51)last week

More from this blog

SRE Tribe

413 posts